US seizes 145 domains linked to BidenCash carding forum

US seizes 145 domains linked to BidenCash carding forum

US law enforcement has seized multiple domains belonging to BidenCash, a well-known dark web marketplace used for selling stolen credit card data, personally identifiable information (PII), and unauthorized server access.

Visitors attempting to access BidenCash's dark web site are now redirected to an official banner from the United States Secret Service (USSS), announcing the domain's seizure as part of a coordinated international crackdown. The operation, led by the USSS and the Federal Bureau of Investigation (FBI), has resulted in the takedown of approximately 145 domains and the confiscation of associated cryptocurrency assets linked to the illicit enterprise.

It is estimated that the operation generated more than $17 million in revenue since launching in March 2022. Over its three-year run, the illegal shop facilitated the trafficking of more than 15 million stolen payment card numbers, with over 117,000 registered users worldwide.

The platform emerged shortly after the closure of the Joker’s Stash carding platform and the dismantling of several other carding forums by Russian authorities, including Trump Dumps, UniCC, and Forum. From the beginning, BidenCash employed aggressive promotional tactics to gain traction. In June 2022, the site leaked a database containing 6,600 credit card records and millions of email addresses. By October of the same year, it had released 1.2 million card numbers in a brazen marketing move. Throughout 2023, BidenCash released two more massive leaks, totaling over 4 million additional credit cards, mostly from US users.


Back to the list

Latest Posts

Cyber Security Week in Review: June 20, 2025

Cyber Security Week in Review: June 20, 2025

In brief: the Langflow, TP-Link and Zyxel flaws exploited in the wild, Russian hackers use ASPs to infiltrate victims’ email accounts, and more
20 June 2025
Russian-linked hackers exploit Google App passwords in email espionage campaign

Russian-linked hackers exploit Google App passwords in email espionage campaign

Victims were tricked into creating and sharing ASPs under the mistaken belief that they are enabling secure communication with the US Department of State.
19 June 2025
FBI-wanted member of ransomware gang arrested in Ukraine, extradited to the US

FBI-wanted member of ransomware gang arrested in Ukraine, extradited to the US

Using custom-developed malware, including ransomware such as LockerGoga, MegaCortex, HIVE and Dharma, the hackers encrypted data on corporate networks.
18 June 2025